Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload

Reply to this post | Go Back
View Post [edit]

Poster: Administrator, Curator, or Staffgarthus1 Date: Apr 5, 2012 5:10pm
Forum: texts Subject: CISPA new threat to the Internet

To all,

The latest threat to Internet freedom:

Under the Cyber Intelligence Sharing and Protection Act (CISPA), if a cyber threat is even suspected, companies we use to access the Internet will have the right to collect information on our activities, share that with the government, refuse to notify us that we are being watched and then use a blanket immunity clause to protect themselves from being sued for violation of privacy or any other illegal action. It's a crazy destruction of the privacy we all rely on in our everyday emails, Skype chats, web searches and more.

But we know that the US Congress is afraid of the world's response. This is the third time they have tried to rebrand their attempt to attack our Internet freedom and push it through under the radar, each time changing the law's name and hoping citizens would be asleep at the wheel. Already, Internet rights groups like the Electronic Frontier Foundation have condemned the bill for its interference with basic privacy rights -- now it's time for us to speak out.

Sign the petition to Congress opposing CISPA. When we reach 250,000 signers our call will be delivered to each of the 100 US Representatives backing the bill:

http://www.avaaz.org/en/stop_cispa/?vl

Reply to this post
Reply [edit]

Poster: dead-head_Monte Date: Apr 20, 2012 1:30pm
Forum: texts Subject: Re: CISPA and NSA new threat to the Internet


The NSA is building this facility in Bluffdale, Utah - the U.S.A.’s Biggest and Newest Spy Center
ff_nsadatacenter_f.jpg


Today on Democracy Now's news hour with Amy Goodman & Juan González
National Security Agency whistleblower William Binney revealed he believes domestic surveillance and Data Mining on Americans has become more expansive under President Obama than Presidents George W. Bush-Dick-Cheney. NSA's Binney estimates the NSA has assembled 20 trillion "transactions" — phone calls, emails and other forms of data — from Americans. This likely includes copies of almost all of the emails sent and received from most people living in the United States. Binney talks about Section 215 of the USA PATRIOT Act and challenges NSA Director Keith Alexander’s assertion that the NSA is not intercepting information about U.S. citizens. This interview is part of a 4-part special.

Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001 he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.” Today marks the first time Binney has spoken on national television about NSA surveillance.

William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency including private emails, cell phone calls and Google searches and other personal data.
• U.S. Federal Regulators OK Domestic Drone Use for DHS, Police, Military, Private Firm
Federal aviation regulators have acknowledged dozens of universities and law-enforcement agencies have been given approval to use drones inside the United States. The list includes the Department of Homeland Security, Customs and Border Protection, various branches of the military, defense contractor Raytheon, drone manufacturer General Atomics, as well as numerous universities. Police departments with drone permits include North Little Rock, Arkansas; Arlington, Texas; Seattle, Washington; Gadsden, Alabama; and Ogden, Utah.

In February, President Obama signed into law a reauthorization of the Federal Aviation Administration (FAA) that requires the agency — on a fairly rapid schedule — to write rules opening U.S. airspace to unmanned aerial vehicles. This puts the FAA at the center of a potentially dramatic set of policy changes that stand to usher in a long list of direct and indirect benefits. But the FAA is not a privacy agency. And although real privacy concerns have arisen about these aircraft, asking the agency to take on the role of privacy czar for unmanned aerial vehicles (UAVs) would be a mistake. Regulating domestic drones read the story by The Washington Post, By Benjamin Wittes and John Villasenor, Published: April 19, 2012.

Reply to this post
Reply [edit]

Poster: dead-head_Monte Date: Apr 26, 2012 9:55am
Forum: texts Subject: Re: CISPA and NSA new threat to the Internet

DemocracyNow! — a daily independent global news hour — April 26, 2012
Targeted Hacker Jacob Appelbaum on CISPA, Surveillance and the "Militarization of Cyberspace"
http://www.democracynow.org/2012/4/26/targeted_hacker_jacob_appelbaum_on_cispa

Computer security researcher Jacob Appelbaum argues the measures included in the proposed Cyber Intelligence Sharing and Protection Act (CISPA) would essentially legalize military surveillance of U.S. citizens. "When they want to dramatically expand their ability to do these things in a so-called legal manner, it’s important to note what they’re trying to do is to legalize what they have already been doing," Appelbaum says. He is a developer and advocate for the Tor Project, a network enabling its users to communicate anonymously on the internet, and has volunteered with WikiLeaks.

https://www.torproject.org/

What is Tor?

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Get involved with Tor »

JUAN GONZÁLEZ: Jacob Appelbaum, I wanted to ask you about a recent report by the Brookings Institute, not exactly a liberal or progressive think tank. But they did a paper called "Recording Everything: Digital Stories as an Enabler of Authoritarian Governments." And some of the quotes here are astonishing. They say, quote, "Plummeting digital storage costs will soon make it possible for authoritarian regimes to not only monitor known dissidents, but to also store the complete set of digital data associated with everyone within their borders."

They go on to say, "When all of the telephone calls in an entire country can be captured and provided to voice recognition software programmed to extract key phrases, and when video footage from public spaces can be correlated, in real time, to the conversations, text messages and social media traffic associated with the people occupying those spaces, the arsenal of responses available to a regime facing dissent will expand. Pervasive monitoring will provide what amounts to a time machine allowing authoritarian governments to perform retrospective surveillance."

This is where the United States is heading, where other authoritarian regimes, much more authoritarian regimes than ours, are heading around the world. And yet, the level of public opposition, especially among some young people, to this continued invasion of their privacy is not that — I mean, it’s strong, it’s growing, but it’s not where it should be.

JACOB APPELBAUM: It’s pretty concerning. I think one thing that’s important to note here is that it’s not a theoretical thing. For example, the WikiLeaks "Spy Files" showed that this kind of dragnet surveillance of all the phone calls of a country is in fact a product that is often sold. I believe it was Libya that purchased some of this equipment from a company called Amesys in France. So, it seems to me that people will try to dismiss it and say, "Well, they’ll never be able to analyze that kind of data." But that’s the problem they’ve been working on for the last 20 years, but especially in the last 10 years. So it’s not only that this data is being collected, but now they want to share it with the Department of Homeland Security, with the FBI and the NSA, essentially legalizing military surveillance over U.S. civilians — and the whole planet, frankly. So this has dramatic international implications in addition to national implications. And this is the same FBI that abuses the national security letters that have been given to them in the USA PATRIOT Act that abuses their authority on a regular basis. And they want to be without some kind of judicial oversight for all of their actions.

Reply to this post
Reply [edit]

Poster: rastamon Date: Apr 20, 2012 1:45pm
Forum: texts Subject: Re: CISPA and NSA new threat to the Internet

I've been to 3 unpopular gatherings where a few speakers gave dire warning of this kind of threat. Alex Jones, Mike Savage are always raggin on all you have posted here, Monte.

No matter if Obama or Romney are elected, all this is fine by either. After all, it's onnnly for our securrrity to fight the terrorists!
Vee vill only go after the evil Ted Nugent & NRA types. Trust us!

...Also check out some that are interviewed on the nighttime AM Radio Show - Coast to Coast. I've been aware of this for years, all from conservative circles. Btw, Bush was no conservative. He was just one side of the same coin of tyranny.

Terms of Use (10 Mar 2001)